org.apache.derby:derby@10.5.3.0 vulnerabilities
-
latest version
10.17.1.0
-
latest non vulnerable version
-
first published
18 years ago
-
latest version published
5 months ago
-
licenses detected
- [0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.apache.derby:derby package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.apache.derby:derby is a database engine by Apache. Affected versions of this package are vulnerable to LDAP Injection due to improper LDAP authentication checks. An attacker can fill up the disk by creating junk databases and execute malware visible to and executable by the account which booted the server. Additionally, if the databases aren't also protected by SQL GRANT/REVOKE authorization, the attacker can view and corrupt sensitive data, and run sensitive database functions and procedures. How to fix LDAP Injection? Upgrade |
[10.1.1.0,10.17.1.0)
|
org.apache.derby:derby is a subproject of the Apache DB project. Affected versions of this package are vulnerable to Security Bypass. A specially-crafted network packet can be used to request the Derby Network Server to boot a database whose location and contents are under the user's control. How to fix Security Bypass? Upgrade |
[10.3.1.4,10.14.2.0)
|
Affected versions of the package are vulnerable to Arbitrary File Overwrite. In Apache Derby 10.1.2.1, 10.2.2.0, 10.3.1.4, and 10.4.1.3, Export processing may allow an attacker to overwrite an existing file. How to fix Arbitrary File Overwrite? Upgrade |
[,10.6.2.1)
|
org.apache.derby:derby is a database engine by Apache. Affected versions of this package are vulnerable to Use of Password Hash With Insufficient Computational Effort. The password hash generation algorithm in the BUILTIN authentication functionality for Apache Derby before 10.6.1.0 performs a transformation that reduces the size of the set of inputs to SHA-1, which produces a small search space that makes it easier for local and possibly remote attackers to crack passwords by generating hash collisions, related to password substitution. How to fix Use of Password Hash With Insufficient Computational Effort? Upgrade |
[10.5.3.0,10.6.1.0)
|